Conference Overview

Threats to government, both internal and external, have dominated cybersecurity attacks this year. These threats to government data aren’t simply from malicious outsiders, in fact two widely publicized major breaches have come from privileged users. According to a recent survey, 40 percent of federal officials named privileged users as “high risks” to their systems. Just as important, 77 percent of those officials said they were playing catch-up and had mere stopgap measures in place.

The Cybersecurity event will help officials get beyond temporary solutions to prevent and manage their internal and external risks. The event will also present FedRamp updates and provide perspective on who’s doing what, when, and how with encryption and access controls.

The Cybersecurity program is designed to provide in-depth education that leads directly into the Government IT Forum exhibit hall where you can meet with suppliers and integrators who can help you implement the solutions you need for success.

Plus, continue your day of education with Spotlight Sessions on these and other related topics presented inside the exhibit hall.


Conference Registration Includes all Events on Tuesday, December 3:

  • Access to all Government IT Forum conference sessions--including those in the co-located Big Data & Business Intelligence, Cloud & Virtualization, Mobile Government, and Records & Information Management events.
  • Access to Opening Keynote and Afternoon Keynote Presentations.
  • Access to the Government IT Forum exhibit hall, including Spotlight Sessions.
  • Digital Downloads of Conference Materials (post-event).
  • Access to the Government IT Forum Mobile App for planning and scheduling as well as notes, downloads and networking.
  • Access to the Government IT Forum Afternoon Networking Reception.

 

Get E-Mail Updates for Future Events
About the 2014 Event

Government IT Forum Government IT Forum CLOUD & VIRTUALIZATION CYBERSECURITY MOBILE GOVERNMENT BIG DATA RECORDS & INFORMATION MANAGEMENT